Analysis

  • max time kernel
    149s
  • max time network
    194s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    20-07-2021 12:30

General

  • Target

    1375950da71f03040d4043d9d84ac4c9.exe

  • Size

    2.6MB

  • MD5

    1375950da71f03040d4043d9d84ac4c9

  • SHA1

    5f4baed37f6eb23d1b6efbe58ece75030f701a77

  • SHA256

    635764197d1aff622d35d6b6c44a72c8a09b60a55ca465cef868ba428b30b164

  • SHA512

    900a66f69a6392e5e73fc52b5ecd5a50559256c8e55dbdeb8ad5634a41774a9745cd07bdcf12ad4c77c39107748fe3ed11c4b27d2c0b518448949ed4e1606ce6

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • autoit_exe 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1375950da71f03040d4043d9d84ac4c9.exe
    "C:\Users\Admin\AppData\Local\Temp\1375950da71f03040d4043d9d84ac4c9.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\Videos\Word.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\Videos\Word.exe"
        3⤵
        • Adds Run key to start application
        PID:888
    • C:\Users\Admin\Videos\Word.exe
      "C:\Users\Admin\Videos\Word.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1664
      • C:\Users\Admin\Videos\Word.exe
        "C:\Users\Admin\Videos\Word.exe"
        3⤵
        • Executes dropped EXE
        • NTFS ADS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of WriteProcessMemory
        PID:1184
        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\VZORBE.rtf"
          4⤵
          • Drops file in Windows directory
          • Modifies Internet Explorer settings
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1468
          • C:\Windows\splwow64.exe
            C:\Windows\splwow64.exe 12288
            5⤵
              PID:876

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\VZORBE.rtf
      MD5

      d295c8b2da0c5e453d9f1a38ce851f38

      SHA1

      edecdb3f9570c1903ed9f77d21920825403f3f8c

      SHA256

      9febf652d086e359850c6db8029301729d35723f4e1bc85279ce53fbc32034f4

      SHA512

      b439accc80b93f575589e37e1774a9815f43281597245feff21466ffd6107325324fc78bb57d431f1b8322c9e125b66e799eac6c75afe37208ae2cf92b805a07

    • C:\Users\Admin\Videos\Word.exe
      MD5

      1375950da71f03040d4043d9d84ac4c9

      SHA1

      5f4baed37f6eb23d1b6efbe58ece75030f701a77

      SHA256

      635764197d1aff622d35d6b6c44a72c8a09b60a55ca465cef868ba428b30b164

      SHA512

      900a66f69a6392e5e73fc52b5ecd5a50559256c8e55dbdeb8ad5634a41774a9745cd07bdcf12ad4c77c39107748fe3ed11c4b27d2c0b518448949ed4e1606ce6

    • C:\Users\Admin\Videos\Word.exe
      MD5

      1375950da71f03040d4043d9d84ac4c9

      SHA1

      5f4baed37f6eb23d1b6efbe58ece75030f701a77

      SHA256

      635764197d1aff622d35d6b6c44a72c8a09b60a55ca465cef868ba428b30b164

      SHA512

      900a66f69a6392e5e73fc52b5ecd5a50559256c8e55dbdeb8ad5634a41774a9745cd07bdcf12ad4c77c39107748fe3ed11c4b27d2c0b518448949ed4e1606ce6

    • C:\Users\Admin\Videos\Word.exe
      MD5

      1375950da71f03040d4043d9d84ac4c9

      SHA1

      5f4baed37f6eb23d1b6efbe58ece75030f701a77

      SHA256

      635764197d1aff622d35d6b6c44a72c8a09b60a55ca465cef868ba428b30b164

      SHA512

      900a66f69a6392e5e73fc52b5ecd5a50559256c8e55dbdeb8ad5634a41774a9745cd07bdcf12ad4c77c39107748fe3ed11c4b27d2c0b518448949ed4e1606ce6

    • \Users\Admin\Videos\Word.exe
      MD5

      1375950da71f03040d4043d9d84ac4c9

      SHA1

      5f4baed37f6eb23d1b6efbe58ece75030f701a77

      SHA256

      635764197d1aff622d35d6b6c44a72c8a09b60a55ca465cef868ba428b30b164

      SHA512

      900a66f69a6392e5e73fc52b5ecd5a50559256c8e55dbdeb8ad5634a41774a9745cd07bdcf12ad4c77c39107748fe3ed11c4b27d2c0b518448949ed4e1606ce6

    • memory/520-64-0x0000000000000000-mapping.dmp
    • memory/876-89-0x0000000000000000-mapping.dmp
    • memory/876-90-0x000007FEFB931000-0x000007FEFB933000-memory.dmp
      Filesize

      8KB

    • memory/888-65-0x0000000000000000-mapping.dmp
    • memory/1140-66-0x0000000004D41000-0x0000000004D42000-memory.dmp
      Filesize

      4KB

    • memory/1140-63-0x0000000000A00000-0x0000000000A21000-memory.dmp
      Filesize

      132KB

    • memory/1140-59-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
      Filesize

      4KB

    • memory/1140-61-0x0000000004D40000-0x0000000004D41000-memory.dmp
      Filesize

      4KB

    • memory/1184-81-0x0000000075D41000-0x0000000075D43000-memory.dmp
      Filesize

      8KB

    • memory/1184-85-0x0000000000400000-0x0000000000546000-memory.dmp
      Filesize

      1.3MB

    • memory/1184-78-0x0000000000400000-0x0000000000546000-memory.dmp
      Filesize

      1.3MB

    • memory/1184-79-0x0000000000426BF7-mapping.dmp
    • memory/1468-82-0x0000000000000000-mapping.dmp
    • memory/1468-83-0x000000006C301000-0x000000006C304000-memory.dmp
      Filesize

      12KB

    • memory/1468-84-0x0000000069D81000-0x0000000069D83000-memory.dmp
      Filesize

      8KB

    • memory/1468-86-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1468-91-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1664-77-0x0000000000840000-0x0000000000841000-memory.dmp
      Filesize

      4KB

    • memory/1664-76-0x0000000000A50000-0x0000000000A5B000-memory.dmp
      Filesize

      44KB

    • memory/1664-73-0x0000000004C50000-0x0000000004C51000-memory.dmp
      Filesize

      4KB

    • memory/1664-71-0x0000000000DC0000-0x0000000000DC1000-memory.dmp
      Filesize

      4KB

    • memory/1664-68-0x0000000000000000-mapping.dmp